GSA Enterprise Physical Access Control System (E-PACS)
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 * GSA Enterprise Physical Access Control System (E-PACS) Privacy Impact Assessment (PIA) June 14, 2021] POINT of CONTACT Richard Speidel gsa.privacyact@gsa.gov Chief Privacy Officer GSA IT 1800 F Street NW Washington, DC 20405 1 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 Instructions for GSA employees and contractors: This template is designed to help GSA employees and contractors comply with the E- Government Act of 2002, Section 208. GSA conducts privacy impact assessments (PIAs) for electronic information systems and collections in accordance with CIO 1878.3 Developing and Maintaining Privacy Threshold Assessments, Privacy Impact Assessments, Privacy Act Notices, and System of Records Notices. The template is designed to align with GSA business processes and can cover all of the systems, applications, or projects logically necessary to conduct that business. The document is designed to guide GSA Program Managers, System Owners, System Managers, and Developers as they assess potential privacy risks during the early stages of development and throughout the system, application, or project’s life cycle. The completed PIA shows how GSA builds privacy protections into technology from the start. Completed PIAs are available to the public at gsa.gov/pia. Each section of the template begins with a statement of GSA’s commitment to the Fair Information Practice Principles (FIPPs), a set of eight precepts that are codified in the Privacy Act of 1974. Please complete all sections in italicized brackets and then delete the bracketed guidance, leaving only your response. Please note the instructions, signatory page, and document revision history table will be removed prior to posting the final PIA to GSA’s website. Please send any completed PIAs or questions to gsa.privacyact@gsa.gov. 2 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 Stakeholders Name of Information System Security Manager (ISSM): ● Matthew Regan, Matthew.Regan@gsa.gov Name of Program Manager/System Owner: ● Scott Lawrence, Scott.Lawrence@gsa.gov Signature Page Signed: ______________________________________ Information System Security Manager (ISSM) ______________________________________ Program Manager/System Owner ______________________________________ Chief Privacy Officer (CPO) - Under the direction of the Senior Agency Official for Privacy (SAOP), the CPO is responsible for evaluating the PIA and ensuring the program manager/system owner has provided complete privacy-related information. Table of contents 3 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 SECTION 1.0 PURPOSE OF COLLECTION 1.1 What legal authority and/or agreements allow GSA to collect, maintain, use, or disseminate the information? 1.2 Is the information searchable by a personal identifier, for example a name or Social Security number? If so, what Privacy Act System of Records Notice(s) applies to the information being collected? 1.3 Has an information collection request (ICR) been submitted to or approved by the Office of Management and Budget (OMB)? If yes, provide the relevant names, OMB control numbers and expiration dates. 1.4 What is the records retention schedule for the information system(s)? Explain how long and for what reason the information is kept. SECTION 2.0 OPENNESS AND TRANSPARENCY 2.1 Will individuals be given notice before the collection, maintenance, use or dissemination and/or sharing of personal information about them? If not, please explain. SECTION 3.0 DATA MINIMIZATION 3.1 Why is the collection and use of the PII necessary to the project or system? 3.2 Will the system create or aggregate new data about the individual? If so, how will this data be maintained and used? 3.3 What controls exist to protect the consolidated data and prevent unauthorized access? 3.4 Will the system monitor members of the public, GSA employees, or contractors? 3.5 What kinds of report(s) can be produced on individuals? 3.6 Will the data included in any report(s) be de-identified? If so, how will GSA aggregate or de-identify the data? SECTION 4.0 LIMITS ON USES AND SHARING OF INFORMATION 4.1 Is the information in the system, application, or project limited to only the information that is needed to carry out the purpose of the collection, maintenance, use, or dissemination? 4.2 Will GSA share any of the information with other individuals, Federal and/or state agencies, or private sector organizations? If so, how will GSA share the information? 4.3 Is the information collected directly from the individual or is it taken from another source? If so, what is the other source(s)? 4.4 Will the system, application, or project interact with other systems, either within GSA or outside of GSA? If so, what other system(s), application(s) or project(s)? If so, how? If so, is a formal agreement(s) in place? SECTION 5.0 DATA QUALITY AND INTEGRITY 5.1 How will GSA verify the information collection, maintenance, use, or dissemination for accuracy and completeness? SECTION 6.0 SECURITY 6.1 Who or what will have access to the data in the project? What is the authorization process for access to the project? 6.2 Has GSA completed a system security plan (SSP) for the information system(s) supporting the project? 6.3 How will the system be secured from a physical, technical, and managerial perspective? 4 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 6.4 Are there mechanisms in place to identify and respond to suspected or confirmed security incidents and breaches of PII? If so, what are they? SECTION 7.0 INDIVIDUAL PARTICIPATION 7.1 What opportunities do individuals have to consent or decline to provide information? Can they opt-in or opt-out? If there are no opportunities to consent, decline, opt in, or opt out, please explain. 7.2 What procedures allow individuals to access their information? 7.3 Can individuals amend information about themselves in the system? If so, how? SECTION 8.0 AWARENESS AND TRAINING 8.1 Describe what privacy training is provided to users, either generally or specifically relevant to the project. SECTION 9.0 ACCOUNTABILITY AND AUDITING 9.1 How does the system owner ensure that the information is being used only according to the stated practices in this PIA? 5 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 Document purpose This document contains important details about the Enterprise Physical Access Control System (E-PACS). To accomplish its mission GSA’s Office of Mission Assurance must, in the course of E-PACS, collect personally identifiable information (PII) about the people who use such products and services. PII is any information[1] that can be used to distinguish or trace an individual’s identity like a name, address, or place and date of birth. GSA uses Privacy Impact Assessments (PIAs) to explain how it collects, maintains, disseminates, uses, secures, and destroys information in ways that protect privacy. This PIA comprises sections that reflect GSA’s privacy policy and program goals. The sections also align to the Fair Information Practice Principles (FIPPs), a set of eight precepts codified in the Privacy Act of 1974.[2] A. System, Application, or Project Name: GSA Enterprise Physical Access Control System (E-PACS) B. System, application, or project includes information about: Authorized federal employees or federal contractors, building occupants, interns, and volunteers who are seeking physical access to secured GSA-controlled facilities. C. For the categories listed above, how many records are there for each? 182,203 as of June 4, 2021. D. System, application, or project includes these data elements: ● Full Name ● Work Email Address ● Work Phone Number ● Organizational Affiliation ● Facial Photograph ● Badge Expiration Date ● Card State (status) ● User Principal Name (UPN) ● Federal Agency Smart Card Number (FASC-N) 6 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 ● Cardholder Unique Identifier (CHUID) ● Public Key Infrastructure (PKI) Certificate - X509 ● Card Authentication Key (CAK) ● Globally Unique Identifier (GUID) ● Access Authorizations specifying the facilities and area that cardholder are permitted to enter Overview The GSA Office of Mission Assurance Physical Access Control Branch manages and administers the Public Building Services owned E-PACS. The application accepts, stores, and updates cardholder and FIPS-201 credential data from GSA and external sources. It stores cardholder identification data such as names, organizational affiliations and photographs; data extracted from the FIPS-201 credentials that are issued to the cardholders; and access authorizations specifying the facilities and areas that cardholders are permitted to enter, as well as the time periods during which such entry is authorized. Cardholder present their FIPS-201 credentials (PIV cards) to GSA E-PACS-managed card readers and, based on the data extracted from these credentials and the associated access authorizations, the GSA E-PACS grants or denies access using electronic locking hardware and access control devices mounted at entry points. All access decisions and transactions are recorded and stored in the application. During the cardholder registration process, a GSA building manager or contracted support staff enrolls the PIV-Credential holder. Upon enrollment, an individual will unlock his or her PIV Credential by inputting his or her truncated PIN. From there, the registration requires a full name, email address, and contact phone number in addition to the public X.509 certificates and the embedded JPEG image of the cardholder, which is stored in the E-PACS database. Only public elements from the PIV Credential are stored in the application. The enrollment into the E-PACS utilizes external key-pads so the GSA employee or contractor registering the individual cannot see the PIN when entered to unlock the PIV Credential. As the PIN is entered, the application truncates the entry so it’s not visible to the registrar. The information is stored and maintained by GSA and is not shared externally. Four (4) GSA security personnel administer the GSA E-PACS on a continual basis to manage/monitor real-time security events at facility entrances and/or GSA security operations control centers. The E-PACS system owner determines what access can be granted to data/information provided by the E-PACS system through information sharing. Currently there are 2 systems where data is shared. The E-PACS system sends the user FASC-N and timestamp to the GSA BookIt Hoteling 7 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 Solution in some locations via a one-way transmission of historic badge swipe information for turnstile entrance readers. The E-PACS system shares the user FASC-N, timestamp, and door name to the BI application to share with D2D. The E-PACS system owner determines what access can be granted to data/information provided by the E-PACS system through information sharing. No additional guidance is provided in making these determinations. Potential privacy risks include the inadvertent or unauthorized access to or disclosure of government employee or contractor data. To reduce risks, E-PACS collects and maintains the minimum amount of personal information that is necessary to verify and grant physical access to GSA-controlled facilities. In addition, once an individual is no longer employed with an agency, then the card is disabled through the agency’s human resources system, the card will be deactivated and not permit access to GSA-controlled facilities. Access rights are continually updated when employees no longer require elevated access to particular facilities. Access to the E-PACS database is also limited to authorized system administrators with the level of access limited to the minimum amount necessary to perform that user’s job responsibilities. There is also a risk associated with the accuracy of data included in the E-PACS. Although most PII is provided directly by the individuals themselves, it is possible that data could be inaccurately entered or mistakenly associated with the wrong individual. To reduce the risk of data being inaccurately entered or incorrectly associated, electronic data collection tools are used to the greatest extent possible and authorized GSA Property Management team members are trained to enroll and gather the appropriate information, and are reminded of the importance of collecting accurate information. The E-PACS utilizes a registration engine, access control systems, and intrusion detection systems. The HID pivCLASS registration engine enrolls the individuals into the E-PACS, which requires the individual’s full name, email address, and contact phone number. Additionally, it imports the X.509 certificates and JPEG image from the PIV Credential. Once the information is imported into the E-PACS, the information is stored in the GSA E-PACS and is not shared externally. When the users gain access to a GSA-controlled facility with their PIV Credentials, the readers are used to verify the data from the PIV cards, ensuring the credential is valid by verifying the Card Authentication Key (CAK) each time the credential is used. If a credential is valid, the user is granted access to the facility, and if it is found to have a revoked certificate, the user’s card is suspended in the E-PACS and the user is denied access into the GSA-controlled facilities. SECTION 1.0 PURPOSE OF COLLECTION 8 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 1.1 What legal authority and/or agreements allow GSA to collect, maintain, use, or disseminate the information? ● 40 U.S.C. Section 582 “Management of buildings by Administrator of General Services” ● 40 U.S.C. Section 585 “Lease Agreements” ● 40 U.S.C. Section 3101 “Public buildings under control of Administrator of General Services” ● 40 U.S.C. Section 11315 “Agency Chief Information Officer” ● 5 U.S.C. Section 552a(b) Privacy Act of 1974, “Government Organization and Employees: Records maintained on individuals.” ● Homeland Security Presidential Directive 12 (HSPD-12), “Policy for a Common Identification Standard for Federal Employees and Contractors.” ● Federal Information Processing Standard 201-2 (FIPS 201-2): Personal Identity Verification (PIV) of Federal Employees and Contractors ● 5 U.S.C. Section 301 “Government Organization and Employees: Departmental Regulations” 1.2 Is the information searchable by a personal identifier, for example a name or Social Security Number? If so, what System of Records Notice(s) apply/applies to the information? The information is searchable in the E-PACS database by name, phone number, email address, or Federal Agency Smart Card Number (FASC-N). The following SORN applies: GSA-OMA-1 E-PACS SORN (79 FR 75810, January 20, 2015) 1.3 Has an Information Collection Request (ICR) been submitted to or approved by the Office of Management and Budget (OMB)? If yes, provide the relevant names, OMB control numbers, and expiration dates. This system is not an information collection request and therefore not covered by the Paperwork Reduction Act (PRA). 1.4 Has a records retention schedule been approved by the National Archives and Records Administration (NARA)? Explain how long and for what reason the information is retained. GSA retains records of PII collected in accordance with General Records Schedule (GRS) 5.6 and 4.2 as approved by the National Archives and Records Administration (NARA) for Security Records. Specific details are provided below: GRS 05.6/020 9 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 (DAA-GRS-2017-0006-0002) Record Title: Key and Card Access Accountability Records - Areas Requiring Highest Level Security Awareness Description: "Records accounting for keys and electronic access cards. Areas requiring highest level security awareness. Includes areas designated by the Interagency Security Committee as Facility Security Level V." Retention: Temporary. Destroy 3 years after return of key, but longer retention is authorized if required for business use. GRS 05.6/130 (DAA-GRS-2017-0006-0018) Record Title: Local Facility Identification and Card Access Records Description: "Temporary employee, contractor, and occasional visitor facility and network identification access card and identity management system records. Identification verification credentials issued by facility or building managers to provide local verification credentials and cards issued by facility or building managers to provide local identification and access. Includes: • temporary identification cards issued to temporary employees, contractors, and occasional visitors who do not meet the FIPS 201 Standard requirements for PIV issuance • supplemental cards issued to access elevators 10 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 • personnel identification records stored in an identity management system for temporary card issuance • parking permits" Retention: Temporary. Destroy upon immediate collection once the temporary credential or card is returned for potential reissuance due to nearing expiration or not to exceed 6 months from time of issuance or when individual no longer requires access, whichever is sooner, but longer retention is authorized if required for business use. GRS 04.2/140 (DAA-GRS-2013-0007-0013) Record Title: Personally identifiable information extract logs Description: "Logs that track the use of PII extracts by authorized users, containing some or all of: date and time of extract, name and component of information system from which data is extracted, user extracting data, data elements involved, business purpose for which the data will be used, length of time extracted information will be used. Also includes (if appropriate): justification and supervisory authorization for retaining extract longer than 90 days, and anticipated disposition date." Retention: Temporary. Destroy when business use ceases. GRS 04.2/130 (DAA-GRS-2013-0007-0012) Record Title: 11 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 Personally identifiable information extracts. Description System-generated or hardcopy print-outs generated for business purposes that contain Personally Identifiable Information. Legal citation: OMB M-07-16 (May 22, 2007), Attachment 1, Section C, bullet “Log and Verify.”" Retention: Temporary. Destroy when 90 days old or no longer needed pursuant to supervisory authorization, whichever is appropriate. SECTION 2.0 OPENNESS AND TRANSPARENCY 2.1 Will individuals be given notice before the collection, maintenance, use or dissemination of personal information about themselves? If not, please explain. Individuals are notified through the posted Privacy Act Notice at the bottom of the Access Request Form when they submit the form to the facility/building management team for access to federally-controlled space. It’s also available in the GSA-OMA-1 EPACS SORN (79 FR 75810). In compliance with the Privacy Act of 1974, 5 U.S.C. § 552a et. Seq., the following information is provided: Solicitation of the information is authorized by the Federal Property and Administrative Services Act of 1949, 40 U.S.C. § 47 et. Seq., as amended, and 5 U.S.C. § 2101a et. seq.; E.O. 9397 (1943). Disclosure of information is voluntary. This form will be used as a means to prepare and issue a credential or pass. Information will be transferred to appropriate Federal, State, local or foreign agencies when relevant to civil, criminal, or regulatory investigations or prosecutions; or pursuant to a request by GSA or any other agency in connection with hiring or retention of an employee, the issuance of a security clearance, the investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit. If some or any part of the requested information is not provided by the individual, the effect will be that the employee will not be issued a credential and will not be allowed to enter a GSA-controlled building after normal working hours or when the building is under security. SECTION 3.0 DATA MINIMIZATION 12 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 3.1 Why is the collection and use of the PII necessary to the system, application, or project? The E-PACS uses PII (x509 certificates) in order to authenticate the identity of federal employees, contractors, or individuals who require or attempt electronic access into a GSA- controlled facility. When the user gains access to a GSA-controlled facility with a PIV Credential, the readers are used to verify the data from the PIV Credential by ensuring the credential is valid by verifying the Card Authentication Key (CAK) each time the credential is scanned for access. E-PACS collects and stores the “Revoked Certificate List,” which is used to verify that an individual PIV is valid. The individual’s name, work email address, and work phone number are also used by the system administrators to verify the identity of an individual when assigning physical access and in the event of an access related error or issue, to contact the individual. The JPEG image may be used to identify a user as well as serve as a verification tool for guards to ensure the user gaining access is the true cardholder. The information is also used to validate the users’ credentials and verify the revocation status. 3.2 Will the system, application, or project create or aggregate new data about the individual? If so, how will this data be maintained and used? The application produces reports that document what activity took place, when, where, and by whom. The reports are created based on parameters that the system administrators enter. Aside from date and time-stamped user activity, the system can generate reports of access groups and members, which is gathered from the existing database of users and access rights. 3.3 What protections exist to protect the consolidated data and prevent unauthorized access? A limited number of administrators have access to the information. Limited administrators have the permissions to generate the reports. Reports are only generated and provided under the following approved reasons. ● Legal proceedings, where pertinent, to which GSA is a party before a court or administrative body. ● To a Federal, State, local, or foreign agency responsible for investigating, prosecuting, enforcing, or carrying out a statute, rule, regulation, or order when GSA becomes aware of a violation or potential violation of civil or criminal law or regulation. ● To duly authorized officials engaged in investigating or settling a grievance, complaint, or appeal filed by an individual who is the subject of the record. 13 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 ● To the Office of Personnel Management (OPM), the Office of Management and Budget (OMB), the Government Accountability Office (GAO), or other Federal agency when the information is required for program evaluation purposes. ● To a Member of Congress or his or her staff on behalf of and at the request of the individual who is the subject of the record. ● To an expert, consultant, or contractor of GSA in the performance of a Federal duty to which the information is relevant. ● To the National Archives and Records Administration (NARA) for records management purposes. ● To appropriate agencies, entities, and persons when (1) The Agency suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (2) the Agency has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by GSA or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with GSA's efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. ● To the workspace and room scheduling system. When an individual swipes their card the FASC-N information is transmitted to automatically check them into previously reserved workspace. This is done as a convenience so the individual won't lose a seat assignment or conference room. Measures are made to ensure administrative user accounts are disabled as soon as the user no longer requires the access. Information requests are verified and Legal Counsel is involved for questionable requests. 3.4 Will the system monitor the public, GSA employees, or contractors? The EPACS may be used to identify the last known devices used by an authorized individual who is enrolled in the system for physical access; however, access logs are not actively monitored. They are only created upon an approved request or in the assistance effort to troubleshoot access issues into a facility. As most facilities are not controlled with a read-in/read- out function, tracking an individual in real time is not possible. 3.5 What kinds of report(s) can be produced on individuals? The E-PACS has the capability of producing transactional reports documenting activities on the E-PACS (date/time-stamped reports with reader usage by individuals; audit reports of who has 14 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 access to particular groups). Those reports are only accessible by a few administrators and are only disseminated if authorized. 3.6 Will the data included in any report(s) be de-identified? If so, what process(es) will be used to aggregate or de-identify the data? For data collection reports, reports are de-identified by removing the names associated with the date/time-stamped entries. Recipients of the reports only see the device and date/time-stamp of the transaction type. The Office of Administrative Services typically requests this type of report. Reports containing date/time-stamped user activity are only created for approved investigation- type requests. These reports are provided directly to the investigative authority performing the approved investigation. Access group reports provide a list of users who have access to a particular restricted elevated access group. These reports are sent to the group’s “owner,” or office’s program manager. The purpose of this audit report is to ensure only specific users have the appropriate access to particular space. SECTION 4.0 LIMITS ON USING AND SHARING INFORMATION 4.1 Is the information in the system, application, or project limited to only the information that is needed to carry out the purpose of the collection? All information collected for the E-PACS is limited to necessary information to operate E-PACS. All data collected is pertinent to ensure appropriate access is added to the proper individuals. The information is used to verify the identity of an individual and in the event of an access related error or issue, to contact the individual. A collection of non-PII will not suffice as there is a need to uniquely identify each individual who has physical access to federally-controlled space. If a person refuses to provide the requested information, it could delay the user gaining physical access to a controlled-facility. The information collected is only accessible to a limited number of authorized system administrators with the level of access limited to the minimum amount necessary to perform that user’s job responsibilities. 4.2 Will GSA share any of the information with other individuals, federal and/or state agencies, or private-sector organizations? If so, how will GSA share the information? 15 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 The information collected at the time of enrollment is not shared externally with the exception of investigative purposes with law enforcement agencies. It is not shared for time or record-keeping for managerial purposes. Information may also be shared for auditing purposes, which may include providing an agency with an access list of who has access to a particular access group. The application produces reports that document what activity took place, when, where, and by whom. The reports are created based on parameters that the system administrators enter. Aside from date and time-stamped user activity, the system can generate reports of access groups and members, which is gathered from the existing database of users and access rights. 4.3 Is the information collected directly from the individual or is it taken from another source? If so, what is the other source(s)? The system collects a full name, the public x509 certificates, and the JPEG directly from the PIV Credential upon enrollment into the system. Only public elements from the PIV are stored in the system. The additional information collected from the individual upon enrollment includes the middle name, if not directly imported from the credential, an email address, and a phone number. This information is necessary in order to provide the individuals with the appropriate electronic physical access to a facility. 4.4 Will the system, application, or project interact with other systems, applications, or projects, either within or outside of GSA? If so, who and how? Is a formal agreement(s) in place? The E-PACS system owner determines what access can be granted to data/information provided by the E-PACS system through information sharing. Currently there are 2 systems where data is shared. The E-PACS system sends the user FASC-N and timestamp to the GSA BookIt Hoteling Solution in some locations via a one-way transmission of historic badge swipe information for turnstile entrance readers. The E-PACS system shares the user FASC-N, timestamp, and door name to the BI application to share with D2D. The E-PACS system owner determines what access can be granted to data/information provided by the E-PACS system through information sharing. No additional guidance is provided in making these determinations. SECTION 5.0 DATA QUALITY AND INTEGRITY 5.1 How will the information collected, maintained, used, or disseminated be verified for accuracy and completeness? The information imported directly from the PIV Credential reflects the issuing agency’s record of information and should be accurate. If errors are found, the user must report it to the issuing authority within his or her agency to correct it. 16 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 The information provided upon enrollment is verified by the E-PACS administrator and compared to the elevated access form submitted by the facility’s building manager or approving official. To address potential occurrences of data being inaccurately entered, information is reviewed by the E-PACS administrators when an Elevated Access Request form is received. Information entered is compared to the information on the form. If information is missing or is inaccurate, the E-PACS administrator may correct it when adding the elevated access based on the enrollment form. SECTION 6.0 SECURITY 6.1 Who or what will have access to the data in the system, application, or project? What is the authorization process to gain access? Access to the PACS database is limited to authorized system administrators with the level of access limited to the minimum amount necessary to perform that user’s job responsibilities. System administrators are federal employees who must have a minimum of a Tier 2 background investigation. Upon approval by the system owner, user-specific administration levels are provided based on administrator’s need. Administrators are provided a unique username and may only access the system while on the GSA network. Upon termination of employment or a change of assignment, administrative rights are removed or modified according to the situation. 6.2 Has GSA completed a System Security Plan (SSP) for the information system(s) or application? An SSP was previously completed on 6/24/2020. 6.3 How will the system or application be secured from a physical, technical, and managerial perspective? Security protocols are leveraging the TechOps GSS physical security settings for the off-site data center. E-PACS utilizes the GSA IT protocols for accessing the servers, using multi-factor authentication. Administrators utilize SSO and Short Name Accounts (SNAs). E-PACS also utilizes VDI to control access to the Brivo Appliance and provide MFA. 6.4 Are there mechanisms in place to identify and respond to suspected or confirmed security incidents and breaches of PII? If so, what are they? EPACS leverages the GSA IT Incident Response Plan structure. An email alert is also sent to the EPACS team in the event of a failed login attempt. 17 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 SECTION 7.0 INDIVIDUAL PARTICIPATION 7.1 What opportunities do individuals have to consent or decline to provide information? Can they opt-in or opt-out? If there are no opportunities to consent, decline, opt in, or opt out, please explain. Federal employees and contractors who routinely access GSA-controlled facilities via the electronic access are legally required to have and use a PIV-Credential to gain such access, and may also be required to use PIV Credentials on card readers to access certain internal locations. If an individual refuses to provide the appropriate information for the E-PACS, then they may be refused electronic access to the GSA-controlled facility. All information provided to or collected by E-PACS may be used for security and law enforcement purposes. 7.2 What procedures allow individuals to access their information? GSA provides individuals with the ability to have access to their personally identifiable information (PII) maintained in its system of records. Individuals may request their records by contacting the E-PACS Program Manager. Additionally, individuals may submit a Freedom of Information Act (FOIA) request for access to their PII for information about any PII about them that is maintained in the E-PACS. Requests may be submitted to EPACS@gsa.gov. 7.3 Can individuals amend information about themselves? If so, how? Individuals may correct inaccurate or erroneous information or update it by contacting their local property managers who may submit an additional Elevated Access Request form with the updates or corrected information, or by reaching out to the E-PACS team at EPACS@gsa.gov. SECTION 8.0 AWARENESS AND TRAINING 8.1 Describe what privacy training is provided to users, either generally or specifically relevant to the system, application, or project. All GSA employees and assigned contractor staff receive the Privacy Act and IT Security Awareness training, and have undergone necessary suitability investigations and receive security clearances for access to classified national security information and facilities. SECTION 9.0 ACCOUNTABILITY AND AUDITING 9.1 How does the system owner ensure that the information is used only according to the stated practices in this PIA? 18 Version 3.4: June 14, 2021
DocuSign Envelope ID: 1F7D20AF-D9EE-495D-9908-C25D1E1E2970 The only individuals with access to the E-PACS are the E-PACS Administrators. All administrators’ user access is based on pre-defined system owner and management authorized job roles and official duties. E-PACS administrators may only input, update, and delete records or fields to which they are authorized to have access and a need-to-know. Additionally, access control software on E-PACS prevents users from having all of the necessary authority or information access to perform fraudulent activity without collusion. [1] OMB Memorandum Preparing for and Responding to the Breach of Personally Identifiable Information (OMB M-17-12) defines PII as: “information that can be used to distinguish or trace an individual's identity, either alone or when combined with other information that is linked or linkable to a specific individual.” The memorandum notes that “because there are many different types of information that can be used to distinguish or trace an individual's identity, the term PII is necessarily broad.” [2] Privacy Act of 1974, 5 U.S.C. § 552a, as amended. 19 Version 3.4: June 14, 2021
You can also read